General
-
Target
2025-02-04_d437582d920e79d09652dfdb6b9d2d34_floxif_icedid_luca-stealer
-
Size
4.6MB
-
Sample
250204-nhj2cavkgs
-
MD5
d437582d920e79d09652dfdb6b9d2d34
-
SHA1
d33089233d937cb97e64d13de51d60838c7098d3
-
SHA256
fb64780bb3ffe80bec6ec032dc571be577a20f7968c909f852023ea9d21a964f
-
SHA512
6285dba47034410b6103e8fd2b5c3e3ad54f4022bb0a5ad350914122f069be783aca020e7505b5403074bfc1b171f751998655bbcef9eb1483650c6459ee07bc
-
SSDEEP
98304:fdq0gThmNTEUwFU2dk77Z6JFhRqQe6QU7A+8/atxsJSAzNN2hH:E0Ghm1t7ApRqd6QU7AKxsJSAzNNOH
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-04_d437582d920e79d09652dfdb6b9d2d34_floxif_icedid_luca-stealer.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2025-02-04_d437582d920e79d09652dfdb6b9d2d34_floxif_icedid_luca-stealer.exe
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
2025-02-04_d437582d920e79d09652dfdb6b9d2d34_floxif_icedid_luca-stealer
-
Size
4.6MB
-
MD5
d437582d920e79d09652dfdb6b9d2d34
-
SHA1
d33089233d937cb97e64d13de51d60838c7098d3
-
SHA256
fb64780bb3ffe80bec6ec032dc571be577a20f7968c909f852023ea9d21a964f
-
SHA512
6285dba47034410b6103e8fd2b5c3e3ad54f4022bb0a5ad350914122f069be783aca020e7505b5403074bfc1b171f751998655bbcef9eb1483650c6459ee07bc
-
SSDEEP
98304:fdq0gThmNTEUwFU2dk77Z6JFhRqQe6QU7A+8/atxsJSAzNN2hH:E0Ghm1t7ApRqd6QU7AKxsJSAzNNOH
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-